authorization.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134
  1. // Copyright (c) Tailscale Inc & AUTHORS
  2. // SPDX-License-Identifier: BSD-3-Clause
  3. package tsconsensus
  4. import (
  5. "context"
  6. "errors"
  7. "net/netip"
  8. "sync"
  9. "time"
  10. "tailscale.com/ipn"
  11. "tailscale.com/ipn/ipnstate"
  12. "tailscale.com/tsnet"
  13. "tailscale.com/types/views"
  14. "tailscale.com/util/set"
  15. )
  16. type statusGetter interface {
  17. getStatus(context.Context) (*ipnstate.Status, error)
  18. }
  19. type tailscaleStatusGetter struct {
  20. ts *tsnet.Server
  21. mu sync.Mutex // protects the following
  22. lastStatus *ipnstate.Status
  23. lastStatusTime time.Time
  24. }
  25. func (sg *tailscaleStatusGetter) fetchStatus(ctx context.Context) (*ipnstate.Status, error) {
  26. lc, err := sg.ts.LocalClient()
  27. if err != nil {
  28. return nil, err
  29. }
  30. return lc.Status(ctx)
  31. }
  32. func (sg *tailscaleStatusGetter) getStatus(ctx context.Context) (*ipnstate.Status, error) {
  33. sg.mu.Lock()
  34. defer sg.mu.Unlock()
  35. if sg.lastStatus != nil && time.Since(sg.lastStatusTime) < 1*time.Second {
  36. return sg.lastStatus, nil
  37. }
  38. status, err := sg.fetchStatus(ctx)
  39. if err != nil {
  40. return nil, err
  41. }
  42. sg.lastStatus = status
  43. sg.lastStatusTime = time.Now()
  44. return status, nil
  45. }
  46. type authorization struct {
  47. sg statusGetter
  48. tag string
  49. mu sync.Mutex
  50. peers *peers // protected by mu
  51. }
  52. func newAuthorization(ts *tsnet.Server, tag string) *authorization {
  53. return &authorization{
  54. sg: &tailscaleStatusGetter{
  55. ts: ts,
  56. },
  57. tag: tag,
  58. }
  59. }
  60. func (a *authorization) Refresh(ctx context.Context) error {
  61. tStatus, err := a.sg.getStatus(ctx)
  62. if err != nil {
  63. return err
  64. }
  65. if tStatus == nil {
  66. return errors.New("no status")
  67. }
  68. if tStatus.BackendState != ipn.Running.String() {
  69. return errors.New("ts Server is not running")
  70. }
  71. a.mu.Lock()
  72. defer a.mu.Unlock()
  73. a.peers = newPeers(tStatus, a.tag)
  74. return nil
  75. }
  76. func (a *authorization) AllowsHost(addr netip.Addr) bool {
  77. a.mu.Lock()
  78. defer a.mu.Unlock()
  79. if a.peers == nil {
  80. return false
  81. }
  82. return a.peers.addrs.Contains(addr)
  83. }
  84. func (a *authorization) SelfAllowed() bool {
  85. a.mu.Lock()
  86. defer a.mu.Unlock()
  87. if a.peers == nil {
  88. return false
  89. }
  90. return a.peers.status.Self.Tags != nil && views.SliceContains(*a.peers.status.Self.Tags, a.tag)
  91. }
  92. func (a *authorization) AllowedPeers() views.Slice[*ipnstate.PeerStatus] {
  93. a.mu.Lock()
  94. defer a.mu.Unlock()
  95. if a.peers == nil {
  96. return views.Slice[*ipnstate.PeerStatus]{}
  97. }
  98. return views.SliceOf(a.peers.statuses)
  99. }
  100. type peers struct {
  101. status *ipnstate.Status
  102. addrs set.Set[netip.Addr]
  103. statuses []*ipnstate.PeerStatus
  104. }
  105. func newPeers(status *ipnstate.Status, tag string) *peers {
  106. ps := &peers{
  107. status: status,
  108. addrs: set.Set[netip.Addr]{},
  109. }
  110. for _, p := range status.Peer {
  111. if p.Tags != nil && views.SliceContains(*p.Tags, tag) {
  112. ps.statuses = append(ps.statuses, p)
  113. ps.addrs.AddSlice(p.TailscaleIPs)
  114. }
  115. }
  116. return ps
  117. }